Skip to content

Commit 2fb2bcb

Browse files
committed
Update detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
1 parent f2d1f82 commit 2fb2bcb

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-ngp
1818
search.appverid: met150
19-
ms.date: 03/03/2025
19+
ms.date: 03/04/2025
2020
---
2121

2222
# Detect and block potentially unwanted applications
@@ -36,6 +36,7 @@ ms.date: 03/03/2025
3636

3737
Microsoft Defender Antivirus is available in the following editions/versions of Windows and Windows Server:
3838

39+
- Windows Server 2025
3940
- Windows Server 2022
4041
- Windows Server 2019
4142
- Windows Server, version 1803 or later
@@ -87,7 +88,7 @@ Although potentially unwanted application protection in Microsoft Edge (Chromium
8788

8889
In Chromium-based Microsoft Edge with PUA protection turned on, Microsoft Defender SmartScreen protects you from PUA-associated URLs.
8990

90-
Security admins can [configure](/DeployEdge/configure-microsoft-edge) how Microsoft Edge and Microsoft Defender SmartScreen work together to protect groups of users from PUA-associated URLs. There are several [group policy settings](/DeployEdge/microsoft-edge-policies#smartscreen-settings) explicitly for Microsoft Defender SmartScreen available, including [one for blocking PUA](/DeployEdge/microsoft-edge-policies#smartscreenpuaenabled). In addition, admins can [configure Microsoft Defender SmartScreen](/microsoft-edge/deploy/available-policies?source=docs#configure-windows-defender-smartscreen) as a whole, using group policy settings to turn Microsoft Defender SmartScreen on or off.
91+
Security administrators can [configure](/DeployEdge/configure-microsoft-edge) how Microsoft Edge and Microsoft Defender SmartScreen work together to protect groups of users from PUA-associated URLs. There are several [group policy settings](/DeployEdge/microsoft-edge-policies#smartscreen-settings) explicitly for Microsoft Defender SmartScreen available, including [one for blocking PUA](/DeployEdge/microsoft-edge-policies#smartscreenpuaenabled). In addition, admins can [configure Microsoft Defender SmartScreen](/microsoft-edge/deploy/available-policies?source=docs#configure-windows-defender-smartscreen) as a whole, using group policy settings to turn Microsoft Defender SmartScreen on or off.
9192

9293
Although Microsoft Defender for Endpoint has its own blocklist based upon a data set managed by Microsoft, you can customize this list based on your own threat intelligence. If you [create and manage indicators](indicators-overview.md) in the Microsoft Defender for Endpoint portal, Microsoft Defender SmartScreen respects the new settings.
9394

0 commit comments

Comments
 (0)